2016
DOI: 10.1016/j.compbiomed.2016.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(16 citation statements)
references
References 35 publications
0
15
0
1
Order By: Relevance
“…They cannot resist the stolen‐verifier attack and man‐in‐the‐middle attack. Both Jiang et al scheme and Sahi et al scheme cannot resist the impersonation attack and achieve the non‐repudiation issue. Furthermore, Wu et al scheme cannot achieve the non‐repudiation protection, and Jiang et al scheme cannot resist the stolen‐verifier attack.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…They cannot resist the stolen‐verifier attack and man‐in‐the‐middle attack. Both Jiang et al scheme and Sahi et al scheme cannot resist the impersonation attack and achieve the non‐repudiation issue. Furthermore, Wu et al scheme cannot achieve the non‐repudiation protection, and Jiang et al scheme cannot resist the stolen‐verifier attack.…”
Section: Discussionmentioning
confidence: 99%
“…Their scheme does not consider the security issues and cannot propose a secure authentication scheme for telecare medicine information systems. In 2016, Sahi et al reviewed the related studies on security and privacy preservation, as well as disaster recovery in the E‐health cloud domain, and discussed how the integrated approaches and the disaster recovery can ensure the reliability and security of cloud projects. However, we found that the cloud computing of their scheme is too rough.…”
Section: Introductionmentioning
confidence: 99%
“…The standards and guidelines related to health-information-system development were analyzed by Carvalho et al [4]. The security and privacy requirements for storing medical records in the Cloud from the perspective of healthcare providers and cloud-service providers were analyzed by Rodrigues et al [5] and by Sahi et al [6]. Rodrigues et al [5] concluded that storing EHRs in the Cloud means that precautions must be taken to ensure data security.…”
Section: Related Workmentioning
confidence: 99%
“…Yaklaşımlar gerekli güvenlik ve gizlilik gereksinimlerini karşılamaktadır. Yaklaşımlardan herhangi birinin başarısız olması durumunda ise mekanizma verimli bir şekilde çalışmamaktadır [20]. Jun Zhou ve arkadaşlarının 2015 yılında yaptığı çalışma ile, dağıtılmış m-Sağlık bulut sisteminde belirtilen gizlilik ve güvenlik gereksinimini gerçekleştiren, yetkili erişilebilir gizlilik modeli ve hasta tarafından yönetilebilen çok seviyeli gizliliği koruyan kooperatif doğrulama şeması (PSMPA) önerilmiştir.…”
Section: E-sağlıkta Güvenlik çöZümleriunclassified